Next Article in Journal
Multidiscipline Integrated Platform Based on Probabilistic Analysis for Manufacturing Engineering Processes
Previous Article in Journal
Internet of Nano-Things, Things and Everything: Future Growth Trends
Article

A Watermark-Based In-Situ Access Control Model for Image Big Data

by 1,2, 1,2,3,*, 4 and 5
1
School of Computer Science, China University of Geosciences, Wuhan 430074, China
2
Hubei Key Laboratory of Intelligent Geo-Information Processing, China University of Geosciences (Wuhan), Wuhan 430074, China
3
Guizhou Provincial Key Laboratory of Public Big Data, GuiZhou University, Guizhou 550025, China
4
School of Computing Science, University of East Anglia, Norwich NR4 7TJ, UK
5
School of Software, University of Technology Sydney, Ultimo, Sydney, NSW 2007, Australia
*
Author to whom correspondence should be addressed.
Future Internet 2018, 10(8), 69; https://doi.org/10.3390/fi10080069
Received: 28 June 2018 / Revised: 24 July 2018 / Accepted: 26 July 2018 / Published: 29 July 2018
(This article belongs to the Section Big Data and Augmented Intelligence)
When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by diverse subjects. Traditional access control methods regulate access privileges to a single image, and their access control strategies are stored in servers, which imposes two shortcomings: (1) fine-grained access control is not guaranteed for areas/layers in a single image that need to maintain secret for different roles; and (2) access control policies that are stored in servers suffers from multiple attacks (e.g., transferring attacks). In this paper, we propose a novel watermark-based access control model in which access control policies are associated with objects being accessed (called an in-situ model). The proposed model integrates access control policies as watermarks within images, without relying on the availability of servers or connecting networks. The access control for images is still maintained even though images are redistributed again to further subjects. Therefore, access control policies can be delivered together with the big data of images. Moreover, we propose a hierarchical key-role-area model for fine-grained encryption, especially for large size images such as geographic maps. The extensive analysis justifies the security and performance of the proposed model. View Full-Text
Keywords: access control; watermark; image; big data access control; watermark; image; big data
Show Figures

Figure 1

MDPI and ACS Style

Guo, J.; Ren, W.; Ren, Y.; Zhu, T. A Watermark-Based In-Situ Access Control Model for Image Big Data. Future Internet 2018, 10, 69. https://doi.org/10.3390/fi10080069

AMA Style

Guo J, Ren W, Ren Y, Zhu T. A Watermark-Based In-Situ Access Control Model for Image Big Data. Future Internet. 2018; 10(8):69. https://doi.org/10.3390/fi10080069

Chicago/Turabian Style

Guo, Jinyi, Wei Ren, Yi Ren, and Tianqing Zhu. 2018. "A Watermark-Based In-Situ Access Control Model for Image Big Data" Future Internet 10, no. 8: 69. https://doi.org/10.3390/fi10080069

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop